Skip to main content

2018 | Supplement | Buchkapitel

Network Forensics Investigation for Botnet Attack

verfasst von : Irwan Sembiring, Yonathan Satrio Nugroho

Erschienen in: IT Convergence and Security 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays the internet users manipulated by several web applications which instruct them to download and install programs in order to interfere the computer system stabilities or other aims. Most users didn’t realize that the applications might have been added with some malicious software such as Worms, and Trojan horse. After the malware infected the victim’s computer, they made the machine to conduct for to the master’s purposes. This process known as botnet. Botnet is categorized as difficult detected malware even with up-to-date antivirus software and causing lot of problems. Network security researcher has developed various methods to detect Botnet invasion. One of the method is forensics method. Network forensics is a branch of Digital forensics which the main task is to analyze the problem (e.g. Botnet’s attack) by identify, classify the networks traffic and also recognize the attacker’s behavior in the network. The output of this system will produce the pattern recognition of Botnet’s attack and payload identification according to Network Forensics Analysis.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shaikh, A.: Botnet Analysis And Detection System. School of Computing, Napier University (2010) Shaikh, A.: Botnet Analysis And Detection System. School of Computing, Napier University (2010)
2.
Zurück zum Zitat Trend Micro Inc.: Zeus: A Persistent Criminal Enterprise. Trend Micro, Incorporated Threat Research Team (2010) Trend Micro Inc.: Zeus: A Persistent Criminal Enterprise. Trend Micro, Incorporated Threat Research Team (2010)
3.
Zurück zum Zitat Laheeb Mohammed Ibrahim: Analysis and Detection of the Zeus Botnet Crimeware. Mosul University, Mosul (2015) Laheeb Mohammed Ibrahim: Analysis and Detection of the Zeus Botnet Crimeware. Mosul University, Mosul (2015)
4.
Zurück zum Zitat Grizzard, J., Sharma, V.: Peer-to-peer botnets: overview and case study. In: HotBots 07 Conference, pp. 1. USENIX Association, Berkeley, CA (2007) Grizzard, J., Sharma, V.: Peer-to-peer botnets: overview and case study. In: HotBots 07 Conference, pp. 1. USENIX Association, Berkeley, CA (2007)
5.
Zurück zum Zitat Huang, S.-Y., Huang, Y.: Network Forensics Analysis Using Growing Hierarchical SOM. Research Center for Information Technology Information, Taipei (2013) Huang, S.-Y., Huang, Y.: Network Forensics Analysis Using Growing Hierarchical SOM. Research Center for Information Technology Information, Taipei (2013)
6.
Zurück zum Zitat Geges, S.: Identifikasi Botnet Melalui Pemantauan Group Activity Pada DNS Traffic. Institut Teknologi Sepuluh Nopember (ITS), Surabaya (2013) Geges, S.: Identifikasi Botnet Melalui Pemantauan Group Activity Pada DNS Traffic. Institut Teknologi Sepuluh Nopember (ITS), Surabaya (2013)
7.
Zurück zum Zitat Chnadran, R.: Network forensics. In: Know Your Enemy Learning about Security Threats, 2nd edn., pp. 281–325. Addison Wesley Professional, Boston (2004) Chnadran, R.: Network forensics. In: Know Your Enemy Learning about Security Threats, 2nd edn., pp. 281–325. Addison Wesley Professional, Boston (2004)
8.
Zurück zum Zitat Kaushik, A.K., Pilli, E.S., Josh, R.C.: Network Forensics System for Port Scanning Attack, Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee, Roorkee, India (2010) Kaushik, A.K., Pilli, E.S., Josh, R.C.: Network Forensics System for Port Scanning Attack, Department of Electronics and Computer Engineering, Indian Institute of Technology Roorkee, Roorkee, India (2010)
Metadaten
Titel
Network Forensics Investigation for Botnet Attack
verfasst von
Irwan Sembiring
Yonathan Satrio Nugroho
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_29